Sold Out
Book Categories |
Part I Instant Messaging Applications
Chapter 1. Introduction to Instant Messaging
Chapter 2. AOL Instant Messenger (AIM)
Chapter 3. Yahoo! Messenger
Chapter 4. MSN Messenger
Chapter 5. ICQ
Chapter 6. Trillian, Google Talk, and Web-based Clients
Chapter 7. Skype
Part II Peer-to-Peer Networks
Chapter 8. Introduction to P2P
Chapter 9. Gnutella Architecture
Chapter 10. eDonkey and eMule
Chapter 11. BitTorrent
Chapter 12. FastTrack
Part III Internet Relay Chat Networks
Chapter 13. Internet Relay Chat-Major Players of IRC
Chapter 14. IRC Networks and Security
Chapter 15. Global IRC Security
Chapter 16. Common IRC Clients by OS
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionSecuring IM and P2P Applications for the Enterprise
X
This Item is in Your InventorySecuring IM and P2P Applications for the Enterprise
X
You must be logged in to review the productsX
X
X
Add Securing IM and P2P Applications for the Enterprise, This book is for system administrators and security professionals who need to bring now ubiquitous IM and P2P applications under their control. Many businesses are now taking advantage of the speed and efficiency offered by both IM and P2P applications, y, Securing IM and P2P Applications for the Enterprise to the inventory that you are selling on WonderClubX
X
Add Securing IM and P2P Applications for the Enterprise, This book is for system administrators and security professionals who need to bring now ubiquitous IM and P2P applications under their control. Many businesses are now taking advantage of the speed and efficiency offered by both IM and P2P applications, y, Securing IM and P2P Applications for the Enterprise to your collection on WonderClub |